socialengineeringdefenseevasionSyssecAdminvirusFTPhackerPIIexploitBECescalationmalwarenetworkriskassessmentzero-dayincidentfirewallspamspoofingsmishingvulnerabilitypasswordbugCIAtriadDarkWebintegritywormIOCAPTCyberDefenseIPSransomwareEDRcomplianceencryptiontrainingIDSinsiderthreatHIPAAriskbusinesscontinuityrootkitpassphrasebreachVPNbotnetPHIspywareMFAcryptographyWISPcyberattackidentitytheftadminavailabilityconfidentialityProofpointIoTsecuritypolicyDDoSDefense-in-depthOSvishingantivirusIPpacketphishingCyberSecurityresiliencesecurityawarenesspentestSecurityOperationsincidentresponsesocialengineeringdefenseevasionSyssecAdminvirusFTPhackerPIIexploitBECescalationmalwarenetworkriskassessmentzero-dayincidentfirewallspamspoofingsmishingvulnerabilitypasswordbugCIAtriadDarkWebintegritywormIOCAPTCyberDefenseIPSransomwareEDRcomplianceencryptiontrainingIDSinsiderthreatHIPAAriskbusinesscontinuityrootkitpassphrasebreachVPNbotnetPHIspywareMFAcryptographyWISPcyberattackidentitytheftadminavailabilityconfidentialityProofpointIoTsecuritypolicyDDoSDefense-in-depthOSvishingantivirusIPpacketphishingCyberSecurityresiliencesecurityawarenesspentestSecurityOperationsincidentresponse

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. social engineering
  2. defense evasion
  3. SyssecAdmin
  4. virus
  5. FTP
  6. hacker
  7. PII
  8. exploit
  9. BEC
  10. escalation
  11. malware
  12. network
  13. risk assessment
  14. zero-day
  15. incident
  16. firewall
  17. spam
  18. spoofing
  19. smishing
  20. vulnerability
  21. password
  22. bug
  23. CIA triad
  24. Dark Web
  25. integrity
  26. worm
  27. IOC
  28. APT
  29. Cyber Defense
  30. IPS
  31. ransomware
  32. EDR
  33. compliance
  34. encryption
  35. training
  36. IDS
  37. insider threat
  38. HIPAA
  39. risk
  40. business continuity
  41. rootkit
  42. passphrase
  43. breach
  44. VPN
  45. botnet
  46. PHI
  47. spyware
  48. MFA
  49. cryptography
  50. WISP
  51. cyber attack
  52. identity theft
  53. admin
  54. availability
  55. confidentiality
  56. Proofpoint
  57. IoT
  58. security policy
  59. DDoS
  60. Defense-in-depth
  61. OS
  62. vishing
  63. antivirus
  64. IP
  65. packet
  66. phishing
  67. Cyber Security
  68. resilience
  69. security awareness
  70. pentest
  71. Security Operations
  72. incident response